Preferred Language
Articles
/
bsj-1059
New Method for the Determination of DL-Histidine by FIA and Chemiluminometric Detection
...Show More Authors

This paper present a simple and sensitive method for the determination of DL-Histidine using FIA-Chemiluminometric measurement resulted from oxidation of luminol molecule by hydrogen peroxide in alkaline medium in the presence of DL-Histidine. Using 70?l. sample linear plot with a coefficient of determination 95.79% for (5-60) mmol.L-1 while for a quadratic relation C.O.D = 96.44% for (5-80) mmol.L-1 and found that guadratic plot in more representative. Limit of detection was 31.93 ?g DL-Histidine (S/N = 3), repeatability of measurement was less that 5% (n=6). Positive and negative ion interferances was removed by using minicolume containing ion exchange resin located after injection valve position.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jan 04 2015
Journal Name
Journal Of Educational And Psychological Researches
Undesirable behaviors for university students by their instructors view
...Show More Authors

Undesirable behaviors among students  are consider one of the danger problems threating societies and educational and scientific institutions of countries  because its one of the way to express aggression , so the instructors consider one of the most important people could be trust their evaluation and logical view , therefore the present research aimed to :

  1. Recognize undesirable behavior in students of University by the view of their instructors
  2. Measure the level of undesirable behavior in students of university by the view of their instructors
  3. Recognize more common  undesirable behavior in students of University by the view o

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Bilinear System Identification Using Subspace Method
...Show More Authors

In this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .

View Publication Preview PDF
Crossref
Publication Date
Sun Mar 01 2009
Journal Name
Baghdad Science Journal
ON NAIVE TAYLOR MODEL INTEGRATION METHOD
...Show More Authors

Interval methods for verified integration of initial value problems (IVPs) for ODEs have been used for more than 40 years. For many classes of IVPs, these methods have the ability to compute guaranteed error bounds for the flow of an ODE, where traditional methods provide only approximations to a solution. Overestimation, however, is a potential drawback of verified methods. For some problems, the computed error bounds become overly pessimistic, or integration even breaks down. The dependency problem and the wrapping effect are particular sources of overestimations in interval computations. Berz (see [1]) and his co-workers have developed Taylor model methods, which extend interval arithmetic with symbolic computations. The latter is an ef

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Feb 04 2016
Journal Name
Journal Of The College Of Basic Education
Punch Holes, Invented Steganography Method Researchers
...Show More Authors

A coin has two sides. Steganography although conceals the existence of a message but is not completely secure. It is not meant to supersede cryptography but to supplement it. The main goal of this method is to minimize the number of LSBs that are changed when substituting them with the bits of characters in the secret message. This will lead to decrease the distortion (noise) that is occurred in the pixels of the stego-image and as a result increase the immunity of the stego-image against the visual attack. The experiment shows that the proposed method gives good enhancement to the steganoraphy technique and there is no difference between the cover-image and the stego-image that can be seen by the human vision system (HVS), so this method c

... Show More
Publication Date
Wed Aug 10 2022
Journal Name
Biochemical And Celluler Archives
Synthesis, Characterization and evaluation the biological activity of some new Schiff bases and 1,3-oxazepin derivatives derived from secondary cyclic amine
...Show More Authors

In this research a new compounds were synthesized started from compound 1 which was synthesized from two moll of piperidine (secondary cyclic amine) with dichloro acetic acid, compound 1 reacted by condensation reaction with methanol and H 2 SO 4 as a catalyst to give the ester compound 2. Compound 2 was reacted with hydrazine hydrate 80 % to give compound 3 , then the compounds 4-13 were synthesized from refluxing of compound 3 with the selected aldehydes and ketones via using few drops of glacial acetic acid, finely step the compounds 4-13 were reacted with phtalic anhydride to give compounds 14-23.. All these compounds were characterized by using of melting point, FTIR, 1 HNMR and mass spectroscopy. Scheme 1 and Scheme 2 shown the all re

... Show More
Publication Date
Tue Jan 31 2023
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on intrusion detection system based on analysis concept drift: Status and future directions
...Show More Authors

Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor

... Show More
View Publication
Publication Date
Sat Oct 04 2025
Journal Name
Mesopotamian Journal Of Computer Science
Enhanced IOT Cyber-Attack Detection Using Grey Wolf Optimized Feature Selection and Adaptive SMOTE
...Show More Authors

The Internet of Things (IoT) has significantly transformed modern systems through extensive connectivity but has also concurrently introduced considerable cybersecurity risks. Traditional rule-based methods are becoming increasingly insufficient in the face of evolving cyber threats.  This study proposes an enhanced methodology utilizing a hybrid machine-learning framework for IoT cyber-attack detection. The framework integrates a Grey Wolf Optimizer (GWO) for optimal feature selection, a customized synthetic minority oversampling technique (SMOTE) for data balancing, and a systematic approach to hyperparameter tuning of ensemble algorithms: Random Forest (RF), XGBoost, and CatBoost. Evaluations on the RT-IoT2022 dataset demonstrat

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Sep 01 2020
Journal Name
Baghdad Science Journal
Developing Arabic License Plate Recognition System Using Artificial Neural Network and Canny Edge Detection
...Show More Authors

In recent years, there has been expanding development in the vehicular part and the number of vehicles moving on the roads in all the sections of the country. Arabic vehicle number plate identification based on image processing is a dynamic area of this work; this technique is used for security purposes such as tracking of stolen cars and access control to restricted areas. The License Plate Recognition System (LPRS) exploits a digital camera to capture vehicle plate numbers is used as input to the proposed recognition system. Basically, the proposed system consists of three phases, vehicle license plate localization, character segmentation, and character recognition, the License Plate (LP) detection is presented using canny edge detection

... Show More
Publication Date
Tue Sep 01 2020
Journal Name
Baghdad Science Journal
Developing Arabic License Plate Recognition System Using Artificial Neural Network and Canny Edge Detection
...Show More Authors

            In recent years, there has been expanding development in the vehicular part and the number of vehicles moving on the roads in all the sections of the country. Arabic vehicle number plate identification based on image processing is a dynamic area of this work; this technique is used for security purposes such as tracking of stolen cars and access control to restricted areas. The License Plate Recognition System (LPRS) exploits a digital camera to capture vehicle plate numbers is used as input to the proposed recognition system. Basically, the proposed system consists of three phases, vehicle license plate localization, character segmentation, and character recognition, the

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Tue Mar 30 2021
Journal Name
College Of Islamic Sciences
Taking Over The Judiciary By Women And The Position Of Law From That: مثالا
...Show More Authors

لمقدمة

     الحمد لله رب العالمين والصلاة والسلام على سيد الأنبياء والمرسلين نبينا محمد صلى الله عليه وسلم وعلى  واصحابه أجمعين  ومن تبعهم وأهتدى بهداهم الى يوم الدين اما بعد :

        فوظيفة القضاء وظيفة سامية يراد منها اقامة العدل ولا يستقيم حالهم الا به دفعاّ للظلم ، ولقد اولى النبي صلى الله عليه وآله وسلم ومن بعده الخلفاء الراشدون

... Show More
View Publication Preview PDF